Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3151 - 3180 of 6721
Full-Text Articles in Physical Sciences and Mathematics
Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar
Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
The idea of public transportation is supported by most in theory but often heavily criticized by users when put into application. There are common tensions that are related to public transportation, as described by frequent users: unreliable, too crowded, and slow. The University of Nebraska-Omaha (UNO) is a growing metropolitan institution that uses a shuttle system to transport students among their three campuses daily. As of 2015, the current total student enrollment is approximately 16,000; UNO plans to enroll 20,000 students by 2020. The expected student growth is also reflected by the current construction of new buildings and expansion of …
Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky
Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky
ETD Archive
Mergers and acquisitions (M&A) are a common technique used by companies to grow and enter new markets. The success rate of these transactions continues to be less than desired. Information Systems (IS) have been proven to be a key component influencing the success of mergers. While numerous factors have been found to lead to systems integration success, the studies have not analyzed the fit that is required when two organizations and systems are joined. This research focuses on the match between organizational variables of competencies and processes of two merging companies, as well as the match between systems variables of …
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz
CCE Theses and Dissertations
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …
An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell
An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell
CCE Theses and Dissertations
Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the …
Meeting Meaningful-Use Requirements With Electronic Medical Records In A Community Health Clinic, Tony Andrew Richardson
Meeting Meaningful-Use Requirements With Electronic Medical Records In A Community Health Clinic, Tony Andrew Richardson
Walden Dissertations and Doctoral Studies
Small nonprofit medical practices lack the technical expertise to implement electronic medical records (EMRs) that are consistent with federal meaningful-use requirements. Failure to comply with meaningful-use EMR requirements affects nonprofit community health care leaders' ability to receive reimbursement for care. Complexity theory was the conceptual framework used in this exploratory single case study. The purpose of the study was to explore the strategies nonprofit community health care leaders in Washington, DC used to implement EMRs in order to comply with the meaningful-use requirements. Data were collected via in-depth interviews with 7 purposively-selected health care leaders in a nonprofit clinic and …
Unexpected Events In Nigerian Construction Projects: A Case Of Four Construction Companies, Gabriel Baritulem Pidomson
Unexpected Events In Nigerian Construction Projects: A Case Of Four Construction Companies, Gabriel Baritulem Pidomson
Walden Dissertations and Doctoral Studies
In Nigeria, 50% to 70% of construction projects are delayed due to unexpected events that are linked to lapses in performance, near misses, and surprises. While researchers have theorized on the impact of mindfulness and information systems management (ISM) on unexpected events, information is lacking on how project teams can combine ISM and mindfulness in response to unexpected events in construction projects. The purpose of this case study was to examine how project teams can combine mindfulness with ISM in response to unexpected events during the execution phase of Nigerian construction projects. The framework of High Reliability Theory revealed that …
The Impact Of Transportation Infrastructure On Nigeria's Economic Developmeny, William A. Agbigbe
The Impact Of Transportation Infrastructure On Nigeria's Economic Developmeny, William A. Agbigbe
Walden Dissertations and Doctoral Studies
The United Nations Development Programme (UNDP) described Nigeria's road networks as one of the poorest and deadliest transportation infrastructural systems in the world. Data from the UNDP and the World Bank (WB) show that Nigeria has suffered transportation infrastructure deficits; these data also illustrate Nigeria as one of the lowest indices in economic development in the last decade. This qualitative case study addressed the impact of a lack of investment in transportation infrastructure in the form of road networks on Nigeria's economic development. The purpose of the study was to understand the relationship between the investment in road networks and …
Exploring Factors Influencing Information Technology Portfolio Selection Process In Government-Funded Bioinformatics Projects, Braulio J. Cabral
Exploring Factors Influencing Information Technology Portfolio Selection Process In Government-Funded Bioinformatics Projects, Braulio J. Cabral
Walden Dissertations and Doctoral Studies
In 2012, the National Cancer Institute's (NCI) Board of Scientific Advisors (BSA) conducted a review of the Center for Biomedical Informatics and Information Technology's (CBIIT) bioinformatics program. The BSA suggested that the lack of a formal project selection process made it difficult to determine the alignment of projects with the mission of the organization. The problem addressed by this study was that CBIIT did not have an in-depth understanding of the project selection process and the factors influencing the process. The purpose of this study was to understand the project selection process at CBIIT. The research methodology was an exploratory …
Providing Hands-On Training With Bioinformatics Databases: A Collaboration Between Vcu Libraries & Wright Center For Clinical And Translational Research, Karen H. Gau, Julie A. Arendt, Amy Olex, Aaron R. Wolen
Providing Hands-On Training With Bioinformatics Databases: A Collaboration Between Vcu Libraries & Wright Center For Clinical And Translational Research, Karen H. Gau, Julie A. Arendt, Amy Olex, Aaron R. Wolen
VCU Libraries Faculty and Staff Presentations
Background
With the goal of increasing specialized services for researchers, Virginia Commonwealth University (VCU) Libraries sent its basic science librarians to an intensive training on bioinformatics databases, “A Librarian’s Guide to NCBI.” VCU’s Wright Center for Clinical and Translational Research (Wright CCTR) was expanding the educational component of its bioinformatics support around the same time. This year, the librarians partnered with the Wright CCTR to offer an introductory bioinformatics database workshop introducing researchers to genetic/genomic databases.
Methods
For one week in June, sessions were conducted introducing up to 30 faculty and staff to The Cancer Genome Atlas and NCBI’s Gene, …
Using A Data Warehouse As Part Of A General Business Process Data Analysis System, Amit Maor
Using A Data Warehouse As Part Of A General Business Process Data Analysis System, Amit Maor
CMC Senior Theses
Data analytics queries often involve aggregating over massive amounts of data, in order to detect trends in the data, make predictions about future data, and make business decisions as a result. As such, it is important that a database management system (DBMS) handling data analytics queries perform well when those queries involve massive amounts of data. A data warehouse is a DBMS which is designed specifically to handle data analytics queries.
This thesis describes the data warehouse Amazon Redshift, and how it was used to design a data analysis system for Laserfiche. Laserfiche is a software company that provides each …
On Detecting Maximal Quasi Antagonistic Communities In Signed Graphs, Ming Gao, Ee-Peng Lim, David Lo, Philips Kokoh Prasetyo
On Detecting Maximal Quasi Antagonistic Communities In Signed Graphs, Ming Gao, Ee-Peng Lim, David Lo, Philips Kokoh Prasetyo
Research Collection School Of Computing and Information Systems
Many networks can be modeled as signed graphs. These include social networks, and relationships/interactions networks. Detecting sub-structures in such networks helps us understand user behavior, predict links, and recommend products. In this paper, we detect dense sub-structures from a signed graph, called quasi antagonistic communities (QACs). An antagonistic community consists of two groups of users expressing positive relationships within each group but negative relationships across groups. Instead of requiring complete set of negative links across its groups, a QAC allows a small number of inter-group negative links to be missing. We propose an algorithm, Mascot, to find all maximal quasi …
Data Persistence In Eiffel, Jimmy J. Johnson
Data Persistence In Eiffel, Jimmy J. Johnson
Theses and Dissertations--Computer Science
This dissertation describes an extension to the Eiffel programming language that provides automatic object persistence (the ability of programs to store objects and later recreate those objects in a subsequent execution of a program). The mechanism is orthogonal to other aspects of the Eiffel language. The mechanism serves four main purposes: 1) it gives Eiffel programmers a needed service, filling a gap between serialization, which provides limited persistence functions and database-mapping, which is cumbersome to use; 2) it greatly reduces the coding burden incurred by the programmer when objects must persist, allowing the programmer to focus instead on the business …
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
Kno.e.sis Publications
The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:
1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.
The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Kno.e.sis Publications
Linking Data initiatives have fostered the publication of large number of RDF datasets in the Linked Open Data (LOD) cloud, as well as the development of query processing infrastructures to access these data in a federated fashion. However, different experimental studies have shown that availability of LOD datasets cannot be always ensured, being RDF data replication required for envisioning reliable federated query frameworks. Albeit enhancing data availability, RDF data replication requires synchronization and conflict resolution when replicas and source datasets are allowed to change data over time, i.e., co-evolution management needs to be provided to ensure consistency. In this paper, …
Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye
Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye
Walden Dissertations and Doctoral Studies
Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection …
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Kno.e.sis Publications
The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …
Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly
Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly
Theses
Online cloud computing courses are becoming more common place facilitating a student to study from home from anywhere in the world. Coupled with this trend is a need for educational institutions to facilitate students to take tests or exams online from home. It reduces the remote student’s time and cost of travel to an exam invigilation centre as well as reducing the educational institution’s test administration overhead. It does however introduce potential quality control concerns. A new industry called online proctoring has emerged that attempts to provide quality control in these online test scenarios.
This research provides an insight into …
Evaluating Information Technology (It) Integration Risk Prior To Mergers And Acquisitions (M&A), Deepak Khazanchi, Vipin Arora
Evaluating Information Technology (It) Integration Risk Prior To Mergers And Acquisitions (M&A), Deepak Khazanchi, Vipin Arora
Information Systems and Quantitative Analysis Faculty Publications
Corporate mergers and acquisitions (M&A) are considered significant, from both a strategic and an economic point of view, across almost all sectors of the economy.1 M&A is a complex process involving risk that ranges from financial and legal matters to sales and marketing challenges and everything in between. Despite well-established benefits of strategically driven expansion and integration of businesses through M&A, the consolidated organization exposes itself to a number of anticipated, unknown and unintended risk factors. The risk concerns the overall organizational integration of some or all of the previously distinct and interdependent assets, structures, business processes, technologies, systems, …
The Relation Between Patient Education And Picc Line Occlusion, Patricia Louise Petroulias
The Relation Between Patient Education And Picc Line Occlusion, Patricia Louise Petroulias
Wayne State University Dissertations
The purpose of this study was to test the feasibility of using an electronic tablet to supplement patient and caregiver education about PICC line maintenance and to compare the percentage of PICC line complications in the intervention group with national percentage rates for patients and caregivers. Newly diagnosed cancer patients who had PICC lines inserted participated in this study. They used an electronic tablet to learn the 10 steps for flushing their PICC lines correctly. They also met with the researcher via FaceTime to review the steps.
A total of 11 patients participated in this quasi-experimental pilot study. They completed …
Strategies To Obtain Maximum Usage Of Enterprise Resource Planning Systems, Edward James Schaffer
Strategies To Obtain Maximum Usage Of Enterprise Resource Planning Systems, Edward James Schaffer
Walden Dissertations and Doctoral Studies
Business organizations invest significant resources implementing enterprise resource planning (ERP) systems, yet some organizations utilize less than 75% of the ERP system capabilities. The purpose of this single-site case study was to explore ERP utilization strategies implemented by 4 managers in the information technology (IT) department from 1 organization that uses an ERP system in the Midwest region of the United States. The conceptual framework that grounded this study was the user participation theory. Data were collected through participant interviews and analyzed using traditional text analysis. Member checking was used to strengthen the credibility and trustworthiness of the interpretation of …
Web Scraping The Easy Way, Yolande Neil
Web Scraping The Easy Way, Yolande Neil
Honors College Theses
Web scraping refers to a software program that mimics human web surfing behavior by pointing to a website and collecting large amounts of data that would otherwise be difficult for a human to extract. A typical program will extract both unstructured and semi-structured data, as well as images, and convert the data into a structured format. Web scraping is commonly used to facilitate online price comparisons, aggregate contact information, extract online product catalog data, extract economic/demographic/statistical data, and create web mashups, among other uses. Additionally, in the era of big data, semantic analysis, and business intelligence, web scraping is the …
Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany
Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany
Conference papers
Abstract The issues of cyberbullying and online harassment have gained considerable coverage in the last number of years. Social media providers need to be able to detect abusive content both accurately and efficiently in order to protect their users. Our aim is to investigate the application of core text mining techniques for the automatic detection of abusive content across a range of social media sources include blogs, forums, media-sharing, Q&A and chat - using datasets from Twitter, YouTube, MySpace, Kongregate, Formspring and Slashdot. Using supervised machine learning, we compare alternative text representations and dimension reduction approaches, including feature selection and …
An Exploration Of Baby Boomer Mass Retirement Effects On Information Systems Organizations, Nithyanandam Mathiyazhagan Mathiyazhagan
An Exploration Of Baby Boomer Mass Retirement Effects On Information Systems Organizations, Nithyanandam Mathiyazhagan Mathiyazhagan
Walden Dissertations and Doctoral Studies
The potential knowledge loss from Baby Boomer generation employee retirements can negatively affect information systems organizations. The purpose of this hermeneutic phenomenology study was to explore the lived experiences of the leaders and managers of information systems organizations as they tried to maintain operational continuity after Baby Boomer worker retirements. The impact of this issue was the operational continuity after the Baby Boomer worker retirement. The social impact of this issue was the knowledge loss events that might result in business loss or even bankruptcy. McElroy's knowledge life cycle model was the conceptual framework for this study that included knowledge …
Strategies To Control Internal Factors Affecting Information Systems Projects In Puerto Rico, Annie Luz Roman Acevedo
Strategies To Control Internal Factors Affecting Information Systems Projects In Puerto Rico, Annie Luz Roman Acevedo
Walden Dissertations and Doctoral Studies
Many project managers and business leaders lack effective strategies to control internal factors that affect information systems (IS) projects, which may impede leadership's ability to respond to market changes. The purpose of this multiple case study was to explore strategies used by 6 purposefully selected project managers who successfully implemented information system development (ISD) projects by controlling the internal factors that affected different ISD project phases in Puerto Rico's telecommunication service industry. The framework that guided this study was coordination theory. The data collection process included semistructured interviews and project documentation including business requirements, project charters, project plans, and lessons …
Retention Of Information Technology Employees, Sherry Ann Dixon
Retention Of Information Technology Employees, Sherry Ann Dixon
Walden Dissertations and Doctoral Studies
Business leaders often realize greater profitability when they have strategies to retain IT
employees. However, the cost to replace IT employees creates significant challenges for
business leaders. Given the growing impact of technology on operational costs, retention
of IT employees is imperative. This exploratory single case study sought to identify the
strategies that leaders use to increase IT employee retention. The population was 6
leaders from a military organization in Norfolk, Virginia, responsible for the retention of
IT employees. Herzberg's two-factor theory was the conceptual framework for this study.
The data was collected from semi-structured interviews with 6 leaders along …
Business Strategies For Asean's Single Window In Southeast Asia, Craig Allen Mcgee Jones
Business Strategies For Asean's Single Window In Southeast Asia, Craig Allen Mcgee Jones
Walden Dissertations and Doctoral Studies
Since the Asian Financial Crisis of 1997 and the Global Financial Crisis of 2007, members of the Association of Southeast Asia Nations (ASEAN) have sought to strengthen ASEAN's regional economies through a digital trade project known as the ASEAN Single Window (ASW). The purpose of this case study was to explore the business strategies that multinational organizational leaders used to overcome business barriers while implementing ASEAN partnership contracts and ASW region-wide projects. This study may be unique in that, at the time of this research, there was no published study in which researchers had explored a single window for a …
Mitigation Strategies Of Technostress On Supply Chain Management, Robert Lewis Penn
Mitigation Strategies Of Technostress On Supply Chain Management, Robert Lewis Penn
Walden Dissertations and Doctoral Studies
Logistics managers work to create practices that reduce technostress, which is associated with diminished productivity in supply chain management. The purpose of this multiple case study was to explore the mitigation strategies that logistics managers at distribution centers used to reduce technostress with their employees in the Los Angeles County, California area. The conceptual framework included in this study was the sociotechnical systems theory. Semistructured interviews were conducted with 6 logistics managers from large distribution centers who implemented mitigation strategies that demonstrably reduced technostress with their employees. Public documents and physical artifacts reviewed in this study included productivity assessment tools, …
Exploring The Cybersecurity Hiring Gap, Adam O. Pierce
Exploring The Cybersecurity Hiring Gap, Adam O. Pierce
Walden Dissertations and Doctoral Studies
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully …
Role Of Outsourcing In Stress And Job Satisfaction Of Information Technology Professionals, Janell Renee Robinson
Role Of Outsourcing In Stress And Job Satisfaction Of Information Technology Professionals, Janell Renee Robinson
Walden Dissertations and Doctoral Studies
Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The purpose of this study was to explore how job-related stress, job dissatisfaction, and turnover intention within the IT profession are influenced by outsourcing as perceived by IT workers themselves. Phenomenology was the methodology used, and the person-environment fit theory formed the theoretical framework for this study. The research questions addressed outsourcing …
Information Abundance And Knowledge Commons, Michael J. Madison
Information Abundance And Knowledge Commons, Michael J. Madison
Book Chapters
Standard accounts of IP law describe systems of legal exclusion intended to prompt the production and distribution of intellectual resources, or information and knowledge, by making those things artificially scarce. The argument presented here frames IP law instead as one of several possible institutional responses to the need to coordinate the use of intellectual resources given their natural abundance, and not necessarily useful or effective responses at that. The chapter aims to shift analytic and empirical frameworks from those grounded in law to those grounded in governance, and from IP law in isolation to IP law as part of resource …